About Cybersecurity Awards


20th Annual 2024 Cybersecurity World Awards

About | 19th Annual 2023 Cyber Security World Awards

Welcome to the security industry’s premier Cyber Security Global Excellence Awards® program honoring achievements in every facet of security and information technology. The Cyber Security Global Excellence Awards were created to honor and generate industry-wide and peer recognition of the best companies, products, people, PR, and more from all over the world.

What are the Cybersecurity World Awards?

Cybersecurity World Awards is one of the world’s most coveted prizes, and it is a program honoring achievements in every facet of security and information technology. The Cyber Security Global Excellence Awards were created to honor and generate industry-wide and peer recognition of the best companies, products, people, public relations, and more from all over the world.

Start An Entry, Login, or Create An Account
Awards Timeline and Fees
Submit an application to be the Judge

The Globee Cybersecurity World Awards recognize cybersecurity companies and professionals for their innovative approaches and effective solutions in ensuring security in the digital age. The awards cover various categories such as risk management, threat detection, cloud security, data privacy, and more. The program aims to raise awareness about cybersecurity issues and honor those who have made significant contributions in protecting organizations and individuals from cyber threats.

This annual awards program celebrates the individuals and teams who set industry benchmarks for excellence in cybersecurity. All organizations private or public, corporations, nonprofits, associations, vendors, and government organizations worldwide are eligible to enter.

Nominate achievements-accomplishments from January 1, 2023 till date of submission.

Back to top


Entry Submissions: Create an Account | Login | Start an Entry | Edit, Save, and Submit

All entry submissions must be made online only. Supporting material is optional but recommended and can be submitted as website links or as attachments.



Deadlines and Fees

Calendar

There are 4 deadlines and the fees increase after each deadline: Early-bird (first deadline), Regular (second deadline), Late (third deadline), and Last deadline (fourth and final).


Early-Bird entry deadlineRegular entry deadlineLate entry deadlineLast chance deadline
Original Fees Discounted by20%10%5%No Discount
Fees for Categories Groups: A3 FreeFreeFree$110
Fees for Categories Groups: B1, B3, C1, D1, E1, E2, F3, G1, G2, and I1$336$378$399$420
Fees for Categories Groups: A1, A2, B2, C2, D2, F1, F2, F4, G3, and H1 $496$558$589$620

Back to top


You Be The Judge | Submit your application now to become a judge for this Cyber Security Awards

Interested in reading and scoring entries from successful companies? All categories will be judged online, and you’ll be able to review and rate as many nominations as you can, at your convenience.

Please create your account using a work/business email only.

After your application has been approved you may request the work/business email to be changed to personal email. Please do not use more than 1 email address as different emails will delay acceptance.



Checkout the judging timelines.

Back to top


Category Groups

A. Company Awards Categories


A1. Company | Achievement Awards Categories Group

A1-001 Achievement in Company Growth
A1-002 Achievement in Customer Growth
A1-003 Achievement in Customer Satisfaction
A1-004 Achievement in Diversity & Inclusion
A1-005 Achievement in Finance
A1-006 Achievement in Hiring
A1-007 Achievement in Human Resources
A1-008 Achievement in International Expansion
A1-009 Achievement in Operations
A1-010 Achievement in Organization Recovery
A1-011 Achievement in Partners and Distribution Growth
A1-012 Achievement in Products and Services Growth
A1-013 Achievement in Products and Services Innovation
A1-014 Achievement in Profits Growth
A1-015 Achievement in Sales or Revenue Generation
A1-016 Achievement in Workplace

Back to top


A2. Company | Best Security Companies Awards Categories Group

A2-001 Best Cybersecurity Conference or Event
A2-002 Best Cybersecurity Education Provider
A2-003 Best Cybersecurity Service Provider of the Year
A2-004 Best Cybersecurity Solutions Consolidator
A2-005 Best Cybersecurity Workplace of the Year
A2-006 Best Data Security Company
A2-007 Best Defensive Cyberspace Operations Service Provider
A2-008 Best Deployments – Artificial Intelligence in Security
A2-009 Best Deployments – Security Cloud/SaaS
A2-010 Best Deployments – Security Hardware
A2-011 Best Deployments – Security Integrated
A2-012 Best Deployments – Security Services
A2-013 Best Deployments – Security Software
A2-014 Best Deployments – Telecommunications Security
A2-015 Company of the Year – Artificial Intelligence in Security
A2-016 Company of the Year – Security Cloud/SaaS
A2-017 Company of the Year – Security Education
A2-018 Company of the Year – Security Hardware
A2-019 Company of the Year – Security Integrated
A2-020 Company of the Year – Security Services
A2-021 Company of the Year – Security Software
A2-022 Company of the Year – Telecommunications Security
A2-023 Corporate Social Responsibility Program of the Year
A2-024 Cyber and Info Security Service Provider of the Year
A2-025 Fastest-Growing Security Company of the Year
A2-026 Hot Security Company of the Year – Artificial Intelligence in Security
A2-027 Hot Security Company of the Year – Security Cloud/SaaS
A2-028 Hot Security Company of the Year – Security Education
A2-029 Hot Security Company of the Year – Security Hardware
A2-030 Hot Security Company of the Year – Security Integrated
A2-031 Hot Security Company of the Year – Security Services
A2-032 Hot Security Company of the Year – Security Software
A2-033 Hot Security Company of the Year – Telecommunications Security
A2-034 Innovation of the Year – Cybersecurity
A2-035 Innovation of the Year – Security Business
A2-036 Most Innovative Security Company of the Year – Artificial Intelligence in Security
A2-037 Most Innovative Security Company of the Year – Security Cloud/SaaS
A2-038 Most Innovative Security Company of the Year – Security Education
A2-039 Most Innovative Security Company of the Year – Security Hardware
A2-040 Most Innovative Security Company of the Year – Security Integrated
A2-041 Most Innovative Security Company of the Year – Security Services
A2-042 Most Innovative Security Company of the Year – Security Software
A2-043 Most Innovative Security Company of the Year – Telecommunications Security
A2-044 Top Business to Business (B2B) Security Vendor of the Year
A2-045 Top Business to Consumer (B2C) Security Vendor of the Year
A2-046 Top Business to Government (B2G) Security Vendor of the Year
A2-047 Top Cloud Service Provider of the Year
A2-048 Top Consulting Service Provider of the Year
A2-049 Top Cyber Security Vendor of the Year
A2-050 Top IT Service Provider of the Year
A2-051 Top Managed Security Service Provider (MSSP) of the Year
A2-052 Top Network Solution Provider of the Year
A2-053 Top System Integrators of the Year
A2-054 Top Telecom Service Provider of the Year
A2-055 Top Value-Added Reseller (VAR) of the Year

Back to top


A3. Company | Startup Awards (formed between 2020 and 2024) Categories Group (NO FEE)

A3-001 Startup Achievement of the Year – Artificial Intelligence in Security
A3-002 Startup Achievement of the Year – Security Cloud/SaaS
A3-003 Startup Achievement of the Year – Security Education
A3-004 Startup Achievement of the Year – Security Hardware
A3-005 Startup Achievement of the Year – Security Integrated
A3-006 Startup Achievement of the Year – Security Services
A3-007 Startup Achievement of the Year – Security Software
A3-008 Startup Achievement of the Year – Telecommunications Security

Back to top

B. Communications, Marketing, and Public Relations Awards Categories


B1. Communications, Marketing, and PR | People Awards Categories Group

B1-001 Best Business Blogger of the Year
B1-002 Best Business Influencer of the Year
B1-003 Communications Executive of the Year | Cybersecurity
B1-004 Communications Professional of the Year | Cybersecurity
B1-005 Cybersecurity Marketer of the Year
B1-006 MARCOM Professional of the Year
B1-007 Marketing Executive of the Year | Cybersecurity
B1-008 Marketing Professional of the Year | Cybersecurity
B1-009 Most Creative Person in Communications or PR | Cybersecurity
B1-010 Most Innovative Person in Communications or PR | Cybersecurity
B1-011 Public Relations Executive of the Year | Cybersecurity
B1-012 Public Relations Professional of the Year | Cybersecurity
B1-013 Social Media Manager of the Year

Back to top


B2. Communications, Marketing, and PR | Agency, Department, Team, and Innovation Awards Categories Group

B2-001 Agency of the Year for Cybersecurity (Advertising & Marketing)
B2-002 Agency of the Year for Cybersecurity (Creative, Digital, SEO, and all others)
B2-003 Agency of the Year for Cybersecurity (Public Relations)
B2-004 Best Cybersecurity Brand Visibility
B2-005 Cybersecurity Campaign of the Year | Best Brand Promotion
B2-006 Cybersecurity Campaign of the Year | Best Corporate Communications
B2-007 Cybersecurity Campaign of the Year | Best Product or Service Launch
B2-008 Cybersecurity Campaign of the Year | Use of Social Media
B2-009 Cybersecurity Communications Department of the Year
B2-010 Cybersecurity Creativity Innovation of the Year
B2-011 Cybersecurity Outstanding Achievement of the Year
B2-012 Cybersecurity PR Innovation of the Year
B2-013 Cybersecurity Project or Initiative of the Year
B2-014 Cybersecurity Team of the Year – Corporate Communications
B2-015 Cybersecurity Team of the Year – Creativity
B2-016 Cybersecurity Team of the Year – Marketing
B2-017 Cybersecurity Team of the Year – Public Relations
B2-018 Cybersecurity Team of the Year – Social Media

Back to top


B3. Communications, Marketing, and PR | Social Media and Creativity Awards Categories Group

B3-001 Best Cybersecurity Collateral-Print of the Year
B3-002 Best Cybersecurity Live Event of the Year
B3-003 Best Cybersecurity Mobile App of the Year
B3-004 Best Cybersecurity Newsletter of the Year
B3-005 Best Cybersecurity Podcast of the Year
B3-006 Best Cybersecurity Training of the Year
B3-007 Best Cybersecurity Video or Short-Film of the Year
B3-008 Best Cybersecurity Website of the Year
B3-009 Best Cybersecurity White-Paper or Research Report of the Year
B3-010 Most Innovative Business Blog
B3-011 Most Innovative Business Podcast
B3-012 Most Innovative Facebook Page
B3-013 Most Innovative Instagram Feed
B3-014 Most Innovative LinkedIn Strategy
B3-015 Most Innovative TikTok Channel
B3-016 Most Innovative Twitter Feed
B3-017 Most Innovative YouTube Channel

Back to top

C. Customer Service & Support Awards Categories


C1. Customer Service & Support | People Awards Categories Group

C1-001 Customer Service Engineer of the Year (Security)
C1-002 Customer Service Executive of the Year (Security)
C1-003 Customer Service Individual of the Year (Security)

Back to top


C2. Customer Service & Support | Department, Team, and Innovation Awards Categories Group

C2-001 Customer Service Department of the Year (Security)
C2-002 Customer Service Innovation of the Year (Security)
C2-003 Customer Service Team of the Year (Security)

Back to top

D. Human Resources Awards Categories


D1. Human Resources | People Awards Categories Group

D1-001 Human Resources Executive of the Year (Security)
D1-002 Human Resources Individual of the Year (Security)

Back to top


D2. Human Resources | Department, Team, and Innovation Awards Categories Group

D2-001 Human Resources Department of the Year (Security)
D2-002 Human Resources Innovation of the Year (Security)
D2-003 Human Resources Team of the Year (Security)

Back to top

E. People Awards Categories


E1. People | Cybersecurity Executive & Professional Awards Categories Group

E1-001 CEO of the Year (Cybersecurity)
E1-002 Continuous Improvement and Optimization Expert of the Year
E1-003 Cybersecurity Audit Professional of the Year
E1-004 Cybersecurity Compliance & Assurance Professional of the Year
E1-005 Cybersecurity Consultant of the Year
E1-006 Cybersecurity Educator of the Year
E1-007 Cybersecurity Journalist of the Year
E1-008 Cybersecurity Professional of the Year | Artificial Intelligence in Security
E1-009 Cybersecurity Professional of the Year | Security Cloud/SaaS
E1-010 Cybersecurity Professional of the Year | Security Hardware
E1-011 Cybersecurity Professional of the Year | Security Integrated
E1-012 Cybersecurity Professional of the Year | Security Others
E1-013 Cybersecurity Professional of the Year | Security Services
E1-014 Cybersecurity Professional of the Year | Security Software
E1-015 Cybersecurity Professional of the Year | Telecommunications Security
E1-016 Cybersecurity Project Leader of the Year
E1-017 Cybersecurity Recruiter of the Year
E1-018 Cybersecurity Service Provider Auditor of the Year
E1-019 Cybersecurity Strategist of the Year
E1-020 Entrepreneur of the Year | Artificial Intelligence in Security
E1-021 Entrepreneur of the Year | Security Cloud/SaaS
E1-022 Entrepreneur of the Year | Security Hardware
E1-023 Entrepreneur of the Year | Security Integrated
E1-024 Entrepreneur of the Year | Security Others
E1-025 Entrepreneur of the Year | Security Services
E1-026 Entrepreneur of the Year | Security Software
E1-027 Entrepreneur of the Year | Telecommunications Security
E1-028 Executive of the Year | Artificial Intelligence in Security
E1-029 Executive of the Year | Security Cloud/SaaS
E1-030 Executive of the Year | Security Hardware
E1-031 Executive of the Year | Security Integrated
E1-032 Executive of the Year | Security Others
E1-033 Executive of the Year | Security Services
E1-034 Executive of the Year | Security Software
E1-035 Executive of the Year | Telecommunications Security
E1-036 Field Engineer of the Year
E1-037 Information Technology Engineer of the Year
E1-038 Information Technology Professional of the Year
E1-039 Lifetime Achievement Award
E1-040 Maverick of the Year
E1-041 Most Innovative Cybersecurity Person of the Year
E1-042 Program Manager of the Year
E1-043 Project Lead of the Year
E1-044 Women in Cybersecurity

Back to top


E2. People | Chief Technology Officers Awards Categories Group (no fee)

E2-001 Chief Technology Officer of the Year | Artificial Intelligence in Security
E2-002 Chief Technology Officer of the Year | Education
E2-003 Chief Technology Officer of the Year | Privacy
E2-004 Chief Technology Officer of the Year | Security Cloud/SaaS
E2-005 Chief Technology Officer of the Year | Security Hardware
E2-006 Chief Technology Officer of the Year | Security Integrated
E2-007 Chief Technology Officer of the Year | Security Services
E2-008 Chief Technology Officer of the Year | Security Software
E2-009 Chief Technology Officer of the Year | Telecommunications Security

Back to top

F. Product & Service and Product Development Awards Categories


F1. Product & Service | Excellence Awards Categories Group

F1-001 Access Control and Management
F1-002 Advanced MSS & MDR
F1-003 Advanced Persistent Threat (APT)
F1-004 Advanced Threat Intelligence
F1-005 Analytics Intelligence & Response
F1-006 Anti Malware, Phishing, Spam, Bot, or Virus Solution
F1-007 Anti-Fraud and Compliance for Mobile Payments
F1-008 Application Programming Interface (API) Management and Security
F1-009 Application Security, DevOps, and Testing
F1-010 Application-Aware Workload Protection
F1-011 Artificial Intelligence Security
F1-012 Asset Discovery & Management
F1-013 Audit (IT and Security)
F1-014 Authentication (Single, Two-Factor, Multi, or Cloud Based) Solution
F1-015 Authorization and Data Governance
F1-016 Automotive Security (IoT)
F1-017 AWS Cloud Security
F1-018 Azure Cloud Security
F1-019 Balanced Development Automation
F1-020 Behavior Analytics, Threat Detection, and Fraud Prevention
F1-021 Best Artificial Intelligence (AI) Threat Detection
F1-022 Best Free Cybersecurity Tool
F1-023 Best In Multi-Cloud Data Activity Service
F1-024 Best Security Hardware (New or Updated version)
F1-025 Best Security Service (New or Updated version)
F1-026 Best Security Software (New or Updated version)
F1-027 Best Security Solution (New or Updated version)
F1-028 Big Data Security and Analytics
F1-029 Biometrics
F1-030 Blockchain & Distributed Ledger
F1-031 Blockchain Security
F1-032 Board Management Software
F1-033 Botnets and Bot Defense
F1-034 Breach and Attack Detection
F1-035 Breach and Attack Protection
F1-036 Breach and Attack Simulation
F1-037 Bring Your Own Device (BYOD) Security
F1-038 Browser Isolation
F1-039 Business Continuity and Disaster Recovery
F1-040 Case Management
F1-041 CCPA Compliance
F1-042 Central Log Management
F1-043 Change Detection
F1-044 Change Management
F1-045 Client-Side Security
F1-046 Cloud Access Security Brokers (CASB)
F1-047 Cloud Based Two-Factor Authentication
F1-048 Cloud Computing Security Solution
F1-049 Cloud Enterprise Resource Planning (ERP)
F1-050 Cloud File Analysis
F1-051 Cloud Identity Governance
F1-052 Cloud Infrastructure Entitlements Management (CIEM)
F1-053 Cloud Infrastructure Security
F1-054 Cloud Infrastructure-as-a-Service
F1-055 Cloud Key Lifecycle Management
F1-056 Cloud Management Platforms
F1-057 Cloud Native Data Security
F1-058 Cloud Network Security
F1-059 Cloud Privileged Access Management
F1-060 Cloud Security
F1-061 Cloud Workload Protection
F1-062 Communication Fraud Protection
F1-063 Communication Risks
F1-064 Communications Security
F1-065 Compliance & Vulnerability Management
F1-066 Compliance Solution
F1-067 Computer Forensic Solution
F1-068 Consulting & Professional Services
F1-069 Container Security
F1-070 Content Disarm and Reconstruction (CDR)
F1-071 Continuous Controls Monitoring
F1-072 Continuous Improvement and Optimization
F1-073 Critical Infrastructure Security
F1-074 Cryptography
F1-075 Customer Security Software (B2C)
F1-076 Cyber Espionage
F1-077 Cyber Insurance
F1-078 Cyber Skilling
F1-079 Cyber Threat Intelligence
F1-080 Cyber Warfare & Cyber Weapons
F1-081 Cyberattacks
F1-082 Cybersecurity Assessment
F1-083 Cybersecurity Education and Training
F1-084 Cybersecurity for Connected Home
F1-085 Cybersecurity Industry Solution – Automotive
F1-086 Cybersecurity Industry Solution – Banking
F1-087 Cybersecurity Industry Solution – Cloud or Internet
F1-088 Cybersecurity Industry Solution – Construction
F1-089 Cybersecurity Industry Solution – Consumers
F1-090 Cybersecurity Industry Solution – Education
F1-091 Cybersecurity Industry Solution – Energy
F1-092 Cybersecurity Industry Solution – Enterprise (for 100 to 500 employees)
F1-093 Cybersecurity Industry Solution – Enterprise (for less than 100 employees)
F1-094 Cybersecurity Industry Solution – Enterprise (for over 500 employees)
F1-095 Cybersecurity Industry Solution – Federal
F1-096 Cybersecurity Industry Solution – Financial Services
F1-097 Cybersecurity Industry Solution – Government
F1-098 Cybersecurity Industry Solution – Healthcare
F1-099 Cybersecurity Industry Solution – Hospitality
F1-100 Cybersecurity Industry Solution – Insurance
F1-101 Cybersecurity Industry Solution – Manufacturing
F1-102 Cybersecurity Industry Solution – Maritime
F1-103 Cybersecurity Industry Solution – Media and Entertainment
F1-104 Cybersecurity Industry Solution – National Cyber Defense
F1-105 Cybersecurity Industry Solution – Online and E-commerce
F1-106 Cybersecurity Industry Solution – Pharmaceuticals & Biotech
F1-107 Cybersecurity Industry Solution – Professional Services
F1-108 Cybersecurity Industry Solution – Retail
F1-109 Cybersecurity Industry Solution – Security Risk Management for Healthcare
F1-110 Cybersecurity Industry Solution – Software
F1-111 Cybersecurity Industry Solution – Supply Chain Security for Healthcare
F1-112 Cybersecurity Industry Solution – Technology
F1-113 Cybersecurity Industry Solution – Telecommunications
F1-114 Cybersecurity Industry Solution – Transportation
F1-115 Cybersecurity Industry Solution – Vulnerability Management for Healthcare
F1-116 Cybersecurity Learning Management System
F1-117 Cybersecurity News
F1-118 Cybersecurity Performance Management
F1-119 Cybersecurity Posture
F1-120 Cybersecurity Program Management
F1-121 Cybersecurity Research
F1-122 Cybersecurity Solution & Service
F1-123 Cybersecurity Talent Assessment
F1-124 Cybersecurity Training
F1-125 Cybersecurity-as-a-Service (CSaaS)
F1-126 Cyberstorage
F1-127 Data Center Security, Backup and Recovery
F1-128 Data Classification
F1-129 Data Cloud Security
F1-130 Data Governance
F1-131 Data Lakes
F1-132 Data Loss Prevention
F1-133 Data Privacy
F1-134 Data Retention
F1-135 Data Security
F1-136 Data Sovereignty
F1-137 Data-centric Security
F1-138 Database Security
F1-139 Deception-Based Security
F1-140 Denial of Service
F1-141 Device Security
F1-142 DevSecOps
F1-143 Digital Certificates
F1-144 Digital Document Security
F1-145 Digital Rights Management
F1-146 Digital Risk Management
F1-147 Digital Security, Forensics & Cyber Intelligence
F1-148 Digital Signatures
F1-149 Disaster Recovery as a Service (DRaaS)
F1-150 Disinformation Campaigns – Fake Content
F1-151 Distributed Denial-of-Service (DDoS) Solution
F1-152 e-Fraud Detection & Prevention
F1-153 Edge Security
F1-154 eDiscovery
F1-155 Email Security and Management
F1-156 Embedded Security
F1-157 Encryption and Smart Cards
F1-158 Endpoint Detection, Visibility, & Response
F1-159 Enterprise Integration Platform as a Service (iPaaS)
F1-160 Enterprise Mobile Threat Defense & Management
F1-161 Enterprise Network Firewalls
F1-162 Enterprise Resource Planning (ERP) Cybersecurity Solution
F1-163 Enterprise Secure Access
F1-164 Extended Detection and Response (XDR)
F1-165 FERC/NERC CIP Compliance
F1-166 Firewalls
F1-167 Firmware Security
F1-168 Forensics & E-Discovery
F1-169 Fraud Protection and Prevention
F1-170 General Data Protection Regulation (GDPR)
F1-171 GLBA Compliance | Gramm-Leach-Bliley Act
F1-172 Google Cloud Security
F1-173 Government Regulations
F1-174 Hacktivism
F1-175 Hardware Access Control
F1-176 HIPAA Compliance | Health Insurance Portability & Accountability Act
F1-177 Human Element
F1-178 Identity and Access Governance
F1-179 Identity and Access Management
F1-180 Identity Proofing and Corroboration
F1-181 Identity Theft | Detection & Resolution Service
F1-182 Identity Theft Resolution Service
F1-183 Incident Analysis & Response Solution
F1-184 Industrial Control Systems (ICS) and SCADA Security
F1-185 Information Archiving & Security
F1-186 Information Security Services and Consulting
F1-187 Infrastructure Security
F1-188 Insider Threats
F1-189 Integrated Active Directory Protection
F1-190 Integrated Cloud Security
F1-191 Integrated Risk Management
F1-192 Internet of Things (IoT) Security
F1-193 Intrusion Prevention and Detection
F1-194 IPSec | SSL | VPN Solution
F1-195 ISO/IEC 27002 Compliance
F1-196 IT Governance, Risk & Compliance
F1-197 IT Outsourcing
F1-198 IT Security-Related Training
F1-199 Just-in-Time Administration
F1-200 Key Management
F1-201 Log Management
F1-202 Machine Learning Security
F1-203 Magecart Protection
F1-204 Managed Detection and Response (MDR)
F1-205 Managed Security Service Provider
F1-206 Memory Protection
F1-207 Messaging Security
F1-208 Micro-Segmentation
F1-209 Mobile & IoT Security
F1-210 Mobile Application Security
F1-211 Mobile Device Management (MDM)
F1-212 Mobile Payment Security
F1-213 Mobile Security
F1-214 Most Innovative Cloud Security
F1-215 Most Innovative Compliance Solution
F1-216 Most Innovative Enterprise Security
F1-217 Most Innovative Next Generation Security
F1-218 Most Innovative Security Integration of the Year
F1-219 Most Innovative Security Service of the Year
F1-220 Most Innovative Security Software of the Year
F1-221 National Security Solution
F1-222 Network Access Control
F1-223 Network and System Admin Training
F1-224 Network Detection and Response
F1-225 Network Security Policy Management (NSPM)
F1-226 Network Traffic Analysis
F1-227 Network Visibility, Security & Testing
F1-228 New Product-Service of the Year | Artificial Intelligence in Security
F1-229 New Product-Service of the Year | Security Cloud/SaaS
F1-230 New Product-Service of the Year | Security Hardware
F1-231 New Product-Service of the Year | Security Integrated
F1-232 New Product-Service of the Year | Security Services
F1-233 New Product-Service of the Year | Security Software
F1-234 New Product-Service of the Year | Telecommunications Security
F1-235 Next Generation Firewall (NGFW)
F1-236 Open Source Security
F1-237 Operational Technologies (OT) Security
F1-238 Optical Document Security
F1-239 Orchestration & Automation
F1-240 Password Management
F1-241 Passwordless
F1-242 Patch Management Tool
F1-243 Patch Vulnerability & Configuration Management
F1-244 Payment Security
F1-245 PCI (Payment Card Industry) Compliance
F1-246 Pen Testing & Breach Simulation
F1-247 Penetration Testing
F1-248 Pentest as a Service (PtaaS)
F1-249 Perimeter-Less Security
F1-250 Persistence
F1-251 Personally identifiable information (PII)
F1-252 Phishing Detection and Response (PDR)
F1-253 Physical Security
F1-254 Platform Integrity
F1-255 Policy and User Management
F1-256 Practitioner Perspectives
F1-257 Privacy and Compliance
F1-258 Privileged Access Control, Security, & Management
F1-259 Privileged Access Workstations
F1-260 Professional Certification Program
F1-261 Protecting Data & the Supply Chain Ecosystem
F1-262 Public Cloud Infrastructure as a Service (IaaS)
F1-263 Public Key Infrastructure (PKI)
F1-264 Quantum Computing
F1-265 Ransomware Protection
F1-266 Ransomware Recovery
F1-267 Real Time Security
F1-268 Red Teaming
F1-269 Regulatory Compliance Solution
F1-270 Remote Access
F1-271 Remote Monitoring and Management (RMM)
F1-272 Remote Wipe
F1-273 Risk & Vulnerability Assessment
F1-274 Risk and Policy Management Solution
F1-275 Runtime Application Protection
F1-276 Runtime Application Self-Protection
F1-277 SaaS Security Solutions
F1-278 SASE & Zero Trust
F1-279 SDLC Security
F1-280 SDN / NFV Security
F1-281 Secure Access
F1-282 Secure Access Service Edge (SASE)
F1-283 Secure Coding
F1-284 Secure Data Erasure
F1-285 Secure File Transfer
F1-286 Secure Mobile Device
F1-287 Secure Payments & Cryptocurrencies
F1-288 Secure Remote Access
F1-289 Secure Web Gateways
F1-290 Securing the Remote Workforce
F1-291 Security Analytics & Threat Detection
F1-292 Security Assessment Management
F1-293 Security Automation
F1-294 Security Awareness & Training
F1-295 Security Backup and Restoration
F1-296 Security Breach Detection Solution
F1-297 Security Consulting
F1-298 Security Information and Event Management (SIEM)
F1-299 Security Intelligence
F1-300 Security Investigation
F1-301 Security Log Analysis
F1-302 Security Management and Operations
F1-303 Security Misconfiguration
F1-304 Security Monitoring
F1-305 Security Operations & Incident Response
F1-306 Security Optimization
F1-307 Security Orchestration, Automation & Response (SOAR)
F1-308 Security Platform
F1-309 Security Posture
F1-310 Security Virtual Assistant
F1-311 Security-as-a-Service Solution
F1-312 Server, Cloud, and Content Security
F1-313 Serverless Security
F1-314 Session Monitoring and Recording
F1-315 Single Sign-On (SSO)
F1-316 Social Engineering
F1-317 Social Media, Web Filtering, and Content Security
F1-318 Software Code Vulnerability Analysis
F1-319 Software Composition Analysis (SCA)
F1-320 Software Development Security
F1-321 Software Integrity
F1-322 Software Supply Chain Security
F1-323 SOX Compliance – Sarbanes-Oxley
F1-324 Storage and Archiving Security
F1-325 Structured Data Security
F1-326 System and Organization Controls (SOC)
F1-327 Third Party Risk Management (TPRM)
F1-328 Threat Modeling
F1-329 Threat Hunting, Detection, Intelligence and Response
F1-330 Trust Protection Solution
F1-331 Trusted User Experience
F1-332 Unified Authorization and Authentication
F1-333 Unified Threat Management (UTM)
F1-334 Unmanaged Devices
F1-335 Unstructured Data Security
F1-336 User and Entity Behavior Analytics (UEBA)
F1-337 Vendor Risk Management
F1-338 Virtual CISO
F1-339 Virtualization, Containerization & Segmentation
F1-340 Vulnerability Assessment, Remediation and Management
F1-341 Web Application Security and Firewalls
F1-342 Website Security
F1-343 Wireless, Mobile, or Portable Device Security
F1-344 Workload Protection in the Cloud
F1-345 Zero Day | Attack & Exploit Detection & Prevention
F1-346 Zero Trust Security

Back to top


F2. Product & Service | Hot Technologies Awards Categories Group

F2-001 Adaptive Security
F2-002 Application Security
F2-003 Artificial Intelligence in Security
F2-004 Attack Surface Management (ASM)
F2-005 Cloud Access Security
F2-006 Dark Web Assessment
F2-007 Data Loss Prevention
F2-008 DDoS Security
F2-009 Deception Technology
F2-010 Digital Footprint & Shadow IT Discovery
F2-011 Digital Forensics
F2-012 Disaster Recovery & Crisis Response
F2-013 Email and Web Security
F2-014 Encryption
F2-015 Endpoint Detection and Response
F2-016 Enterprise Mobility Management
F2-017 Identity and Access Management
F2-018 Information Technology Cloud/SaaS
F2-019 Information Technology Hardware
F2-020 Information Technology Integrated
F2-021 Information Technology Services
F2-022 Information Technology Software
F2-023 Next Generation Firewall
F2-024 Privacy and Compliance
F2-025 Privileged Access Management
F2-026 Security Cloud/SaaS
F2-027 Security Hardware
F2-028 Security Incident and Event Management (SIEM)
F2-029 Security Integrated
F2-030 Security Operations Center (SOC)
F2-031 Security Orchestration
F2-032 Security Services
F2-033 Security Software
F2-034 Security Telecommunications
F2-035 Software-Defined Security
F2-036 Third Party Vendor Risk Management
F2-037 Threat Intelligence
F2-038 Vulnerability Assessment & Penetration Testing
F2-039 Web Application Firewall
F2-040 Zero Trust Security

Back to top


F3. Product Development | People Awards Categories Group

F3-001 Product Developer of the Year
F3-002 Product Development/Management Engineer of the Year
F3-003 Product Development/Management Executive of the Year
F3-004 Product Development/Management Professional of the Year

Back to top


F4. Product Development | Department, Team, and Innovation Awards Categories Group

F4-001 Product Development/Management Department of the Year
F4-002 Product Development/Management Innovation of the Year
F4-003 Product Development/Management Team of the Year

Back to top

G. Chief Information Security Officer (CISO) and Security Users Awards Categories


G1. Security Users | CISO of the Year Awards Categories Group

G1-001 CISO of the Year | Banking
G1-002 CISO of the Year | Business
G1-003 CISO of the Year | Consumer
G1-004 CISO of the Year | Financial Services
G1-005 CISO of the Year | FinTech
G1-006 CISO of the Year | Healthcare
G1-007 CISO of the Year | Information Technology
G1-008 CISO of the Year | Insurance
G1-009 CISO of the Year | Manufacturing
G1-010 CISO of the Year | Online or E-commerce
G1-011 CISO of the Year | Other
G1-012 CISO of the Year | Pharmaceutical
G1-013 CISO of the Year | Technology (all)
G1-014 CISO of the Year | Telecommunication

Back to top


G2. Security Users | Professional of the Year Awards Categories Group

G2-001 Security Engineer of the Year
G2-002 Security Executive of the Year
G2-003 Security Professional of the Year
G2-004 Security Professional of the Year | Training and Development

Back to top


G3. Security Users | Department, Team, and Innovation Awards Categories Group

G3-001 Cybersecurity Audit Team of the Year
G3-002 Cybersecurity Team of the Year
G3-003 Defensive Cyberspace Operations Team of the Year
G3-004 Most Innovative Cybersecurity Team of the Year
G3-005 Security Operations Center (SOC) Team of the Year
G3-006 Security Training (Internal) of the Year

Back to top

H. Thought Leadership Awards Categories


H1. Thought Leadership | Cybersecurity Thought Leadership Awards

H1-001 Best Use of Thought Leadership in Cybersecurity Alliances
H1-002 Best Use of Thought Leadership in Strengthening Cyber Resiliency
H1-003 Cybersecurity Thought Leadership of The Year

Back to top